Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Kexin Pei"'
Publikováno v:
IEEE Transactions on Software Engineering. 49:2776-2790
Autor:
Kexin Pei1 kpeics@columbia.edu, Yinzhi Cao2 yinzhi.cao@jhu.edu, Junfeng Yang1 junfeng@columbia.edu, Jana, Suman1 suman@columbia.edu
Publikováno v:
Communications of the ACM. Nov2019, Vol. 62 Issue 11, p137-145. 9p. 2 Color Photographs, 5 Diagrams, 6 Charts.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Juliane R. Sempionatto, Fangyu Zhang, Ahmed A. Khorshed, Nicholas Tostado, Kexin Pei, Ernesto De la Paz, Andre N. De Loyola e Silva, Joseph Wang, Sheng Xu, Thitaporn Sonsa-ard, Muyang Lin, Lu Yin
Publikováno v:
Nature Biomedical Engineering. 5:737-748
Monitoring the effects of daily activities on the physiological responses of the body calls for wearable devices that can simultaneously track metabolic and haemodynamic parameters. Here we describe a non-invasive skin-worn device for the simultaneou
Autor:
Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray
Determining whether multiple instructions can access the same memory location is a critical task in binary analysis. It is challenging as statically computing precise alias information is undecidable in theory. The problem aggravates at the binary le
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a8dfd62d1319f60b5820708966a2d056
Autor:
Songchen Yao, Suman Jana, Jonas Guan, Zhongtian Chen, Baishakhi Ray, Vikas Ummadisetty, David Williams-King, Matthew Broughton, Kexin Pei, Junfeng Yang
Publikováno v:
ESEC/SIGSOFT FSE
Binary type inference is a critical reverse engineering task supporting many security applications, including vulnerability analysis, binary hardening, forensics, and decompilation. It is a difficult task because source-level type information is ofte
Autor:
Yinzhi Cao, Yuchi Tian, Suman Jana, Shiqi Wang, Justin Whitehouse, Junfeng Yang, Carl Vondrick, Baishakhi Ray, Kexin Pei
Publikováno v:
ACM SIGOPS Operating Systems Review. 53:59-67
Deep learning (DL) systems are increasingly deployed in safety- and security-critical domains including autonomous driving, robotics, and malware detection, where the correctness and predictability of a system on corner-case inputs are of great impor
Autor:
Juliane R. Sempionatto, Ahmed A. Khorshed, Lu Yin, Muyang Lin, Fangyu Zhang, Sheng Xu, Ernesto De la Paz, Andre N. De Loyola e Silva, Kexin Pei, Joseph Wang, Thitaporn Sonsa-ard, Nicholas Tostado
The growing demand for tracking the effects of diverse daily activities upon the body physiological response calls for continuous monitoring devices, with integrated hemodynamic and metabolic sensing modalities. This work presents the first demonstra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2cf91d8e36e1dead2d1532c5aea113bd
https://doi.org/10.21203/rs.3.rs-40455/v1
https://doi.org/10.21203/rs.3.rs-40455/v1
Publikováno v:
NDSS
Accurate and robust disassembly of stripped binaries is challenging. The root of the difficulty is that high-level structures, such as instruction and function boundaries, are absent in stripped binaries and must be recovered based on incomplete info
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7fd0fd0b95b4b20a4fe4c20803fdb71a
Publikováno v:
GetMobile: Mobile Computing and Communications. 22:36-38
Deep learning (DL) systems are increasingly deployed in safety- and security-critical domains including self-driving cars and malware detection, where the correctness and predictability of a system's behavior for corner case inputs are of great impor